Skip to content

Instantly share code, notes, and snippets.

@zsyed91
Last active September 28, 2022 19:43
Show Gist options
  • Star 2 You must be signed in to star a gist
  • Fork 2 You must be signed in to fork a gist
  • Save zsyed91/5f453183bab45c7b45262283fb9ed61d to your computer and use it in GitHub Desktop.
Save zsyed91/5f453183bab45c7b45262283fb9ed61d to your computer and use it in GitHub Desktop.
Using Rails encrypted credentials with database.yml
# Used as the base secret for all MessageVerifiers in Rails, including the one protecting cookies.
secret_key_base: "key generated from <rails secret>"
production:
database_username: username
database_password: password
# SQLite. Versions 3.8.0 and up are supported.
# gem install sqlite3
#
# Ensure the SQLite 3 gem is defined in your Gemfile
# gem 'sqlite3'
#
default: &default
adapter: sqlite3
pool: <%= ENV.fetch("RAILS_MAX_THREADS") { 5 } %>
timeout: 5000
development:
<<: *default
database: db/development.sqlite3
# Warning: The database defined as "test" will be erased and
# re-generated from your development database when you run "rake".
# Do not set this db to the same as development or production.
test:
<<: *default
database: db/test.sqlite3
production:
<<: *default
adapter: postgresql
database: <%= ENV['DATABASE_NAME'] %>
host: <%= ENV['DATABASE_ENDPOINT'] %>
port: <%= ENV.fetch('DATABASE_PORT', 5432) %>
username: <%= Rails.application.credentials.dig(:production, :database_username) %>
password: <%= Rails.application.credentials.dig(:production, :database_password) %>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment